fkie_cve-2021-41769
Vulnerability from fkie_nvd
Published
2022-01-11 12:15
Modified
2024-11-21 06:26
Severity ?
Summary
A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6md85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E55D4EE1-5396-428B-BF0E-9B66DD3B9B93", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6md85:-:*:*:*:*:*:*:*", matchCriteriaId: "23076116-128D-4366-B5BC-B965001FE356", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6md86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "43DFE191-EE7A-42E8-8D21-F75825912E05", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6md86:-:*:*:*:*:*:*:*", matchCriteriaId: "3457758B-A04D-4544-B0FA-DF87AA11D8FE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6md89_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A4D4ECFF-0B63-4BA5-B950-DB6F78A91AA1", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6md89:-:*:*:*:*:*:*:*", matchCriteriaId: "1F0672FC-AEC1-445B-B958-AEDB6DCEE1E6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:6mu85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "69DB2FA3-0839-4D3F-B9A2-9CFA1ED3E2A6", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:6mu85:-:*:*:*:*:*:*:*", matchCriteriaId: "48B19AFF-787A-4488-A392-7B6FD4F5C95B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ke85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E1D653DC-FCF1-4713-88D0-3BDDCE278320", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ke85:-:*:*:*:*:*:*:*", matchCriteriaId: "751F0BFE-216F-4620-BD5A-451B5F49C09C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sa82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6A9C6FCD-8D57-4DE6-93E8-661AAFA6CC7C", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sa82:-:*:*:*:*:*:*:*", matchCriteriaId: "AF247CA0-37E1-40DF-96F5-9F00128EA250", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sa86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3D70AFC-4446-462A-AFEB-4F0176D12A4C", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sa86:-:*:*:*:*:*:*:*", matchCriteriaId: "EDD3C99B-CDD8-4919-BE72-73814C2642A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sa87_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "2A1F39C1-6003-481F-A51C-A1B12C996296", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sa87:-:*:*:*:*:*:*:*", matchCriteriaId: "DBE6CCA9-A246-4EB2-A57B-FE6823A9E3FD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sd82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5E3CAE64-8679-4F6D-9EBE-6884CDB1E706", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sd82:-:*:*:*:*:*:*:*", matchCriteriaId: "E11B4A68-F533-4AC0-80A9-7374FDFE2DEA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sd86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4DC35435-6120-4633-B804-9296F6CC4170", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sd86:-:*:*:*:*:*:*:*", matchCriteriaId: "73F8D692-F268-45A4-9348-C67890A58881", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sd87_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB086218-D97F-4538-B5B0-4BCBFD2507EE", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sd87:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5A3FFD-17AD-4820-97D3-2F093BD5F322", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sj81_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB159224-C95D-4D02-A246-805835BC76D6", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sj81:-:*:*:*:*:*:*:*", matchCriteriaId: "5C915CB6-F50F-445E-A004-2073C342A3EB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sj82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "35FAEFB2-F451-49FA-9AD3-1CE2B55D2F63", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sj82:-:*:*:*:*:*:*:*", matchCriteriaId: "5739872A-E271-48BB-ABB5-17608E81AE7A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sj85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D18CA496-D571-4869-8187-B87E62536FFE", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sj85:-:*:*:*:*:*:*:*", matchCriteriaId: "ECC6417D-2C81-4654-B7FF-6C3E1B709962", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sj86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C32BE93-54C4-4049-A3FE-61C236D00A9F", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sj86:-:*:*:*:*:*:*:*", matchCriteriaId: "C52A6630-46F3-4113-B5E8-F5BAB7801CB0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sk82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "82A96AF5-7A5C-4364-B783-12BDE2FCB90F", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sk82:-:*:*:*:*:*:*:*", matchCriteriaId: "088AC7F2-4FF3-4EF9-A111-D47DB859ECA1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sk85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7770B84C-289D-4CE9-ADE5-8437D3847649", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sk85:-:*:*:*:*:*:*:*", matchCriteriaId: "73DD95AC-9B8F-43CD-9483-2BB9C4E86376", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sl82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A9A3980-D9E1-4391-8445-6A8576C53891", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sl82:-:*:*:*:*:*:*:*", matchCriteriaId: "8A9F05D9-C1DF-4D73-8634-239ABFE526DB", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sl86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7060DCFA-104F-4A7C-B383-08109CCCBCDB", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sl86:-:*:*:*:*:*:*:*", matchCriteriaId: "0C6662F7-5E3D-43A8-9984-EF1540BC917B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sl87_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8355AFE6-EFD3-4A4E-B9B3-D3C2FA1C4B1B", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sl87:-:*:*:*:*:*:*:*", matchCriteriaId: "E122323B-A42B-4DAB-A071-ACF76DC45E28", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ss85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C4B9B9F0-4D9C-410F-BA66-F20A7F05E630", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ss85:-:*:*:*:*:*:*:*", matchCriteriaId: "5877387C-E05B-4231-9016-01FE7B197589", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7st85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DC3CE3FB-35A8-4B05-93A3-0E03E7E68534", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7st85:-:*:*:*:*:*:*:*", matchCriteriaId: "D4038082-939F-4DE7-B59F-00E46CD1B2B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sx800_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BD5CC546-6DE4-49AC-AD90-1AFACD07AE33", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sx800:-:*:*:*:*:*:*:*", matchCriteriaId: "0D6E71D2-F1F9-4F3E-9EC7-5CBFFAEC0F7B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7sx85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "23EDFE31-2E88-46CE-B9F9-9987A2E526F6", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7sx85:-:*:*:*:*:*:*:*", matchCriteriaId: "A4C20553-B052-414C-BF9C-C091828A9628", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7um85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C6291EE-4FDD-4D64-A601-08E753F3B5C2", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7um85:-:*:*:*:*:*:*:*", matchCriteriaId: "AAA9E810-2C00-4721-B3A6-E7CD7184BA24", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ut82_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "533C9A8C-E01B-4558-A52B-354097526A25", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ut82:-:*:*:*:*:*:*:*", matchCriteriaId: "2E959A8E-21D1-4950-974B-A89693C14DC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ut85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3C0B397C-CF1E-4B38-9CA7-D27947A1B995", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ut85:-:*:*:*:*:*:*:*", matchCriteriaId: "DA075D19-21BF-4A7C-87B8-6A9D99799826", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ut86_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FFF601CF-3DD5-4396-9FB0-65348FD19394", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ut86:-:*:*:*:*:*:*:*", matchCriteriaId: "7AC0D445-9A9B-4799-8B83-8B15821A6CC1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ut87_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1CA48ABC-06FD-427A-8B88-7447C8D94B7F", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ut87:-:*:*:*:*:*:*:*", matchCriteriaId: "D2A73860-76C5-435B-8150-1EABF644ADA0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7ve85_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91277098-7513-492E-84D1-0283FDDA7E02", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7ve85:-:*:*:*:*:*:*:*", matchCriteriaId: "2D58566D-C2F7-4D9A-ACD6-D493E4531491", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:siemens:7vk87_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F8B8BD9A-3AF2-4D61-AD9B-A908749F6D4F", versionEndExcluding: "8.83", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:siemens:7vk87:-:*:*:*:*:*:*:*", matchCriteriaId: "5D9FD3B7-C7F7-41C1-9290-411F9D912D00", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability has been identified in SIPROTEC 5 6MD85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MD89 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 6MU85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7KE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SA86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SA87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SD86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SD87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ81 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SJ85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SJ86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SK82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SK85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7SL86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SL87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SS85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7ST85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7SX85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UM85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT82 devices (CPU variant CP100) (All versions < V8.83), SIPROTEC 5 7UT85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT86 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7UT87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VE85 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 7VK87 devices (CPU variant CP300) (All versions < V8.83), SIPROTEC 5 Compact 7SX800 devices (CPU variant CP050) (All versions < V8.83). An improper input validation vulnerability in the web server could allow an unauthenticated user to access device information.", }, { lang: "es", value: "Se ha identificado una vulnerabilidad en los dispositivos SIPROTEC 5 6MD85 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 6MD86 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 6MD89 (variante de CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 6MU85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7KE85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SA82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SA86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SA87 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD82 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD86 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SD87 (variante CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SJ81 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ82 (variante CPU CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ85 (variante CPU CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SJ86 (variante CPU CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SK82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SK85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SL82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SL86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7SL87 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SS85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7ST85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7SX85 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), SIPROTEC 5 7UM85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT82 (CPU variante CP100) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT85 (CPU variante CP300) (Todas las versiones anteriores a V8.83), SIPROTEC 5 7UT86 (CPU variante CP300) (Todas las versiones anteriores a V8. 83), dispositivos SIPROTEC 5 7UT87 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 7VE85 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 7VK87 (variante de CPU CP300) (Todas las versiones anteriores a V8.83), dispositivos SIPROTEC 5 Compact 7SX800 (variante de CPU CP050) (Todas las versiones anteriores a V8.83). Una vulnerabilidad de comprobación de entrada inapropiada en el servidor web podría permitir a un usuario no autentificado acceder a la información del dispositivo", }, ], id: "CVE-2021-41769", lastModified: "2024-11-21T06:26:43.700", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "NONE", baseScore: 5, confidentialityImpact: "PARTIAL", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:P/I:N/A:N", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "HIGH", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2022-01-11T12:15:10.037", references: [ { source: "productcert@siemens.com", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://cert-portal.siemens.com/productcert/pdf/ssa-439673.pdf", }, ], sourceIdentifier: "productcert@siemens.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-20", }, ], source: "productcert@siemens.com", type: "Secondary", }, { description: [ { lang: "en", value: "CWE-20", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.